This is a little long, but read the whole thing. It is another example of “Why I Carry.”

I received a text from a relative the other night… this is what it said:So, I’m busy at the time at a business open house and on my way home I give the relative a call.

Background:

Barron For Scale…

Before I get into the details of the story, let me relate the following. This relative is 74 years old, under 5 foot, and has silver-gray hair and is a breast cancer survivor. From now on we will just refer to her as: “Short Lady with the Gray Hair” or SLwtGH for short. She drives a retired police car we picked up used for a decent price after her previous car finally began to die after 23 years of use.

Story:

I call the SLwtGH and she informs me of the events from her day. For whatever reason that morning she decided that she needed to carry Tweety, her revolver with her. She headed into Tacoma to play bridge with some friends. For those who aren’t familiar with the People’s Republic of Puget Sound, Tacoma isn’t exactly the friendliest depending on where you are, but this was going to be mid day and she would be traveling home by 1500 so it’s not like the animals would be prowling right?

She leaves her friend’s house and at about 1440 she turns left off of E 38th street and heads North on East Portland Ave.

The full frame of the incident. The distance from E38th to Fairbanks is .4 miles.

At the time she turned left she checked her rear view mirror and saw no one behind her, blind spot clear she moved from the left lane to the right lane.

At East Fairbanks she noticed two dark color vehicles approaching from the rear. She maintained speed at 40 thinking this is nothing significant, other than traffic.

One vehicle rapidly speeds past, immediately pulls in front, rapidly stops forcing the SLwtGH to slam on her brakes. The second car blocks the drivers side preventing immediate egress from the area. The only exit is backwards or through the vehicles.

Three men get out of the vehicles. Two out of the vehicle directly in front. The third got out of the vehicle blocking the driver side. One has a revolver at his side, another has a knife, the third has a semi-automatic pistol. At this point the SLwtGH is dialing 911 and drawing her firearm. She places it in a retention position on her chest. About midway through their approach of the vehicle the men stop their approach. They begin conversing, the words said are unknown. At this same time the SLwtGH is relaying her location to dispatch.

Suddenly there is a siren and lights approaching from the east. The officers pull in front of the two black cars blocking any attempted egress and the officers exit the vehicle weapons drawn. The officer and his partner in the first car immediately took control of the situation and put the individuals in custody. Two other cars arrived shortly after.

After the officers had placed the individuals in custody they approached the SLwtGH , asked to see her weapon and carry permit. She was then informed they were well acquainted with subjects, she was absolutely justified and had nothing to worry about. They would be going away for an extended period on multiple warrants. She was thanked for maintaining poise and thoughtfulness.

She let the officers clear the scene and then she did so.

Major notes, the criminals were traveling in packs, attempted to attack what they thought they was a soft target. This event happened in broad daylight on a thoroughfare.

AAR and my takes:

Most likely this was an attempted car jacking. As the SLwtGH was driving a retired police car it is both hardened, as well as useful if you want to imitate being an officer to rob people. Overall the event happened quickly, it was lucky there were officers in the immediate vicinity. The SLwtGH kept her cool and remained calm event though she was under stress.

In this incident all three elements for deadly force existed:

Ability: They were armed and there was no question about them being so.

Opportunity: Two of the individuals were armed with ranged weapons capable of piercing the windshield.

Jeopardy: The men out numbered an elderly, short, woman, blocked her vehicle, were approaching it armed, with no legal reason to be doing so.

Alternative Weapons:

While giving a debrief she noted that even if she attempted to back up, she would have still had difficulty fleeing because of the distance required to get around them. I reminded her of two things.

She was in a hardened vehicle that gives her an advantage others don’t have. She could have backed up enough to wedge through the two vehicles.

Her vehicle has enough power and is reinforced on the front that she could have pushed that front car out-of-the-way.

Remember your vehicle is a weapon, don’t be afraid to use it as such.

It happens fast, remain calm:

This kicked off fairly fast, I’m impressed SLwtGH was able to get 911 on the horn and have her firearm ready to rock.

This was most likely because she did not sit in denial of the events happening in front of her. Many people when confronted will deny what’s going on, trying to rationalize that this isn’t really happening or that they’re being hyper critical and the danger they’re seeing isn’t really there. Process your input and act on it, don’t deny what you’re seeing, don’t down play it. Let the data and events speak for itself. If new data says it’s not as dangerous, great, but don’t trying and play the hypotheticals as it is happening.

Her firearm made the difference.

The presence of her firearm interrupted their game plan. This was a defensive gun use, however statistically this wouldn’t be counted. As a side note this makes for 5 defensive gun uses in my family, in all 5 instances there wasn’t a shot fired. They had their own preconceived notion of how this was going to go down. They figured it was a soft target and would need little effort other than intimidation. When they approached the vehicle, the firearm caused them to suddenly need to start working on a new game plan. I’ve seen this happen personally in another incident where the individual was armed.

If you find yourself in a similar situation that is the moment you need to capitalize on. What has happened is the initiative has flipped, they no longer have the edge of their plan. This is when you can either talk the person down, I did in one case, wait and see if they’re going to decide discretion is the better part of valor, as the SLwtGH did here.

Additional side note, if they are already committed to performing an act of violence in their plan such as shooting you, they will likely not freeze or stop. I suspect this is because mentally that haven’t counted on the escalation path and the probability of them not surviving the encounter. Someone already committed to the violent act will most likely not waver.

Final thoughts:

Sean’s notes on this are spot on. We’ve got yet another crap gun control initiative in this state being funded by Bloomberg and company. In two weeks time there were two defensive gun uses within my family.

The issue isn’t with firearms, it isn’t with law-abiding gun owners, it’s with the tolerant behavior surrounding violent crime. We’re restricting the rights of the innocent under the guise of stopping criminals, and then acting surprised criminals are becoming bolder, because they don’t care. In the end, criminals prey on the weak. Why are we wanting the people who’ve contributed to society and continue to do so turned into prey?

So don’t you dare tell me blood is on our hands for supporting gun owners and law-abiding citizens. 5 defensive gun uses, not a single shot fired in any of them, and in the last one:

The Short Lady with the Grey Hair stared down a bunch of armed thugs to the point where they’re now sitting in jail.

How ready are you for when violence shows up unexpectedly? Remember it doesn’t call ahead, you’re not really going to get a warning until it happens. Are you ready to be like the Short Lady with the Gray Hair?

So my focus is shifting largely due to focus on my professional career, limited time, and frankly the political scene is something that has me so damn angry I need shit to take my mind off of it. For instance I’ve spent my past three weekend moving servers around for a bunch of gun bloggers I take care of hosting for.

For those who don’t know I’m a host, who’s having random sabbaticals, over at The Gunblog Variety Cast. And well if you know me or have been lucky enough to friend me on Facebook, sorry I don’t just accept anyone, overall I have a solid bead on the tech security space.

The Problem

So incase you’ve been under a rock there have been some major events recently about computer security. First up was “WannaCry“.

WannaCry propagates using EternalBlue, an exploit of Windows’ Server Message Block (SMB) protocol. Much of the attention and comment around the event was occasioned by the fact that the U.S. National Security Agency (NSA) had discovered the vulnerability in the past, but used it to create an exploit for its own offensive work, rather than report it to Microsoft.[22][23] It was only when the existence of this vulnerability was revealed by The Shadow Brokers that Microsoft became aware of the issue,[24] and issued a “critical” security patch on 14 March 2017 to remove the underlying vulnerability on supported versions of Windows, though many organizations had not yet applied it.[25]

The thing is, there’s way more that was in the Shadow Brokers dump and the hits keep coming. CVE-2017-7494 came out May 30th, 2017. This affects “SAMBA”, which is the implementation of the Windows Server Message Block protocol for Linux. I expect a decent chunk of my readership, at least of what’s left since I haven’t written in a year, just went “What!?” It’s at this point I’m going to try to break it down Barney style, ask questions in the comments.

The Windows SMB protocol is how Windows does file sharing. So when you type something like \mymachinename\ and you see a list of folders available, it’s making use of that protocol. This protocol is also implemented for Linux that allows you to have a Linux server serving files for Windows machines.

So before I get too much further lets talk about these exploits. Including a very recent CVE-2017-8543 that was patched Tuesday June 13th. All of them through various methods allowed for whats called “Unauthenticated Remote Code Execution.” The scary thing about 8543 is that it is a zero day, which means that it was found being actively exploited in the wild before the release of the patch.

What does that mean, someone, anyone, could cause the end point service to execute arbitrary code sent to it. This wasn’t intentional, that is what makes this an exploit. Someone found a bug that causes the service to behave in this way. What does that really mean though? It means anyone can send a carefully crafted message to your computer that will make it does whatever they want, including encrypting your data to deny you access.

What does this mean?

So, I hear many of you saying, “Well I have Windows not Linux so I’m good just applying the Microsoft patches right?” This is where I scare the crap out of everyone.

Embedded Linux is used almost everywhere, from cell phones, to ATMs, Network Attached Storage, to the common home wireless router. The good news is really old routers didn’t really offer this as a feature, the bad news is starting around 2013 routers started shipping with USB and eSATA ports so one could connect an external hard drive and share it across the network. It basically was a feature that allowed people to quickly deploy a NAS.

These embedded devices are all using the SAMBA service as they’re running embedded Linux. It’s worth noting the vulnerability exists going all the way back to March 1st of 2010. So basically any and every router with these features is affected. Going a step further every NAS (Network Attached Storage) device on the market is likewise affected.

So the devices have a software bug, which allows arbitrary code execution which can result in the following:

Denial of access to data. It’s encrypted and only decrypted, if they feel like it, after you pay them a ransom.

Do NOT pay the ransom. There is no escrow and thus no guarantee you will actually recover your data.

Exfiltration of data. Someone searches through your data, saves what they can make money from. Could be IP theft or blackmail.

But it’s a software bug, we just need to get the patch from the manufacturer and life is going to be good right?

The Rub

Image from PCWorld.com

Most of these devices aren’t being updated anymore. That is to say, manufacturers will most likely not be releasing an update to patch this issue if the device is more than a year old.

I’ve got a very nice WRT-1900AC. The last firmware update was in the middle of 2015. It has features that fall under this and tools show it is vulnerable to the exploit. Let me put this another way. My 300 dollar router, yes that’s what it cost when I bought it, got updates for a year and was then out of service and now critical bugs are being found and left unfixed by the vendor.

Unlike Windows and WannaCry, manufacturers of these devices will leave users vulnerable. Worse, removing them from the network will remove one of the more beneficial features, Network Attached Storage. In the case of routers, these devices are often placed on the border between a users private network and the internet so they are exposed to malicious traffic.

Ideally the router does not present the SMB interface to the internet, however this isn’t to say malicious packets will not find their way into the interior network from the internet if other issues are found with the router. At which point the router will fall victim.

It gets worse…

While working on this post an article came out over at SearchSecurity, discussing CherryBlossom. This was a project by the CIA to attack router security issues including a lack of firmware validation.

“On the enterprise side, the big router manufacturers have offered validation of signed firmware for quite some time. The problem is that it’s not enabled by default for the most part, and it requires that a network admin actually go and do something,” Kuzma told SearchSecurity. “Both the Cisco and Juniper tools rely on MD5 hashes. MD5 is broken as a hashing algorithm, with several known and feasible techniques for generating identical hashes from wildly different binary content.”

So this isn’t event just a commercial issue but even an enterprise level issue. Firmware can be updated remotely, over wireless in many cases and has no validation of the code being installed as being from the vendor. Additionally the router provides a fantastic vantage point for an attacker. He can sit in the middle and analyze all your traffic undetected.

It’s like climbing to the top of a peak overlooking a valley. You can see everything from the vantage point. Not only see in this case, because the router can redirect and alter your traffic to do even more.

So What Do We Do?

First, maintain an offline backup of all your data. Grab a hard drive, copy your important files on to it, and update it periodically. Do NOT leave it connected to your computer or network. Doing so will leave you vulnerable if something does get in. Plan on when, not if, someone gets in and locks up your data.

Part of this also stems from a “Jack of All Trades” view of equipment in the consumer space and improper defaults in the enterprise space. Really, who wants to buy multiple pieces of equipment and who wants to take the extra steps in configuration?

The problem is in the consumer space ongoing maintenance and support of products is nonexistent. In the enterprise IT space there are products that are undergoing long-term use and support. Hardware that is often used is basically a mini computer and the router software and firewall is like installing an operating system.

This is where I say something I hate. Because honestly I prefer the easy route for anyone and everyone. It needs to be trivial for a user to do. The problem is this route is leading us down a horrible path because manufacturers are not maintaining their equipment for that path to work.

What’s that mean? You need to actually build a proper firewall appliance and use if for your network. I’m going to write-up a multi part series how-to with instructions. There are a bunch of hardware options, which in itself can lead to the paralysis of analysis. My goal through this is to give a guide of hardware and software to put you in a position you can easily succeed.

The thing is, that’s just bare hardware. It’s dumb, doesn’t do anything, and still needs software and a configuration to run. So what should you use to protect your network. Currently the desired guard dog is pFsense. This takes some work to set up and configure, but in the end will last longer, will be better maintained, and protect your data more reliably.

Over the next couple weeks I will be writing up a how-to on deployment and looking at creating a default deployment image for that hardware if possible. My hardware choice is slightly different, not because that hardware isn’t good, it’s because I’m doing some advanced deployment for my network.

OpenWRT/DD-WRT are both options as well but there’s a few issues. One they don’t solve the secure update problem seen in Cheery Blossom. You will still need to disable and remove the mass storage features of the router. While one could look at this you’re also going to no longer use the router as a router but merely an access point.

Depending however on the capabilities of the router, you can do advanced things within your network which still will leverage those capabilities. Ideally though you would still update your router software to OpenWRT/DD-WRT to deal with the exploit, but there can still be a lag or lack of support for your router by either of these solutions. Not to mention the process can be unforgiving and leave you with a brick.

Conclusion:

If you know a friend who’s into IT and computers, now is a good time to buy a case of beer and invite him over to see if he can help. These issues are only going to get worse, especially since the Shadow Brokers are now charging for exploit dumps. Meaning Blackhat hackers will be buying the exploits and unless some whitehats also buy them, which is funding criminal enterprise, we will not know what exploits are in the wild until the malware hits.

Putting multiple eggs into the same basket is becoming more and more risky and we need to start diversifying and looking at using the best tools to protect critical assets. The last thing we want to do is combine the defensive position with the material we’re trying to defend.

This is going to get worse, defense is going to get harder, and the time to start building your earthworks and redoubts is now.

Imagine the collective ass puckering and mental detonations if the NRA were to sponsor the NASCAR series. Not just a car, but the entire series.

The series trophy would be Charlton Heston holding an AR-15 and would be called the Dead Hands Cup. Imagine the screaming of the opposition as every where they looked were images and advertising from the NRA on national TV. The cries as the series winner stood up with a trophy with an AR-15 on top at the end.

Now as much fun as that would all be, I would rather send funds to the front line for the fight, but the fallout from the other side would be down right hilarious.

*Found in the drafts folder and I’m wondering why I never hit publish…

Last Sunday was a sad day. On Facebook I had noted my good friend Ray Carter, aka GayCynic, aka Northwest Freethinker, had passed away. It created a large wake within the gun community spurring a few articles such as this one. Sadly this meant I was going to meet a handful of mutual online friends in meat-space for the first time as we said goodbye to another friend.

The good news was, Ray being Ray made the service a fun ride, having planned much of it in advance himself. Including 37 minutes of prelude music (iTunes link).

Ray’s Playlist

Even to the point of writing his own naming in the service:

Raymond was by his own admission over-serious and more sensitive than was really in his own best interests. He was a recovering alcoholic, sober since 1996 with all the benefits and flaws that implies. He sought to be a good son, to accept his brother for who he was, and to be a good uncle and friend.

Ray was driven to activism by many things. His sense of obligation to those who went before, his fundamental opposition to injustice, his patriotism, his love for his fellow man and his belief that often the kindest and most moral thing a government can do is to leave individuals to work out their own destiny.

Ray considered his nieces a special blessing, and loved them every day of their lives. His favorite holiday was Christmas and he went over the top each year that he could, going wild with decorating and striving to uphold the family traditions. He enjoyed cooking, reading and bull sessions with friends.

His time with the Freedom Day Committee, culminating in co-chairing a Pride Parade was a proud memory that he always enjoyed sharing. He took even greater joy in his time working with the Second Amendment Foundation and for firearms rights, which he saw as just another side of the same issue – civil rights – with debatably saner players. Or at least differently nuts.

Ray came to Masonry later in life, following his father and grandfather into lodge membership. He found this an opportunity for service and as an immense comfort during the last years of his life. He requests that in lieu of flowers or other donations that word be made to the Masonic Scholarship Fund of Alki Lodge #152.The growth of the lodge and facilitating educational opportunities for today’s youth was critically important to him.

The support of the Second Amendment Foundation, his friends and colleagues there, and particularly the support and tolerance of Alan and Julie Gottlieb made possible a dignified and graceful passage and rose well above any reasonable expectation of an employer; they are to be commended for their efforts and Ray hopes they accept his deepest gratitude.

Ray asked that I make clear that this service celebrating his life celebrate ALL of his life – not just one part or another. He chose music, verses and asked for themes that reflected who he was – a decidedly out gay man, a pro-gun activist, a patriot, a “small l” libertarian, a supporter of LGBT rights, and all the other roles in his life. He admitted he cheated and threw in one or two songs that he loved just for the beauty of the songs and asked that all of us here forgive him his final whimsy.

I realize now after the service there was a LARGE number of people who for various reasons weren’t able to make it but wanted to be there. I hope this glimpse into the service will suffice and put a smile on your face like Ray would have wanted.

There was limited commentary while sitting in the church regarding stories about Ray. Well anyone that knows Ray knows exactly why that is, I can’t think of any stories that are “Sanctuary Appropriate”. I made sure the story of Ray and Linoge was given to everyone in the room.

A couple of years ago I wrote this piece warning about snake oil in sales pitches. I wasn’t able to get my hands on the hardware to do my test but I knew there were most likely going to be serious flaws. I had stated I was more than willing to do an analysis for free if sent a sample product. Honestly I kind of wish I had bought one, because this shit is gold:

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

[First, go read the whole thing; all of it. There are different things that can be used for quotes, but that final line says it all.

If you’re having trouble understanding why they wouldn’t help the government there’s a couple different things going on here. If you read their security document for iOS there is little that can actually be done. While no one on this side of the fence is supporting the actions of those asshats that shot up a Christmas party the most common argument I’ve seen has been appeal to emotion to catch those that supported them.

Yes, I want to catch them. Then break into their phone!!! Apple is aiding and abetting by not helping. No they’re not because there’s a lot more at stake than just one phone despite the claims by the government. Anything they build can be used against any other iPhone. Not only that, if it falls into the wrong hands it can be used for criminal enterprise.

Tim used the following line as well:

Criminals and bad actors will still encrypt, using tools that are readily available to them.

This is most definitely true. As pointed out to me by Ashley, if you replace the words and shift the subject this reads like letter from the President of the NRA.

I came to the following realization which cements just how important and how right this stance is. What the FBI wants fails the Jews in the Attic test. To think that this will only be used in this one case is naïve and without forethought. There is no way you will keep a genie like this in the bottle. At some point it’s going to get out and it’s not going be pretty.

Say what you will about Apple, but at least they have the balls to stand up and not just play dead due to an “Appeal to Emotion.” -B ]

As Speaker Pro Tempore for the Washington House of Representatives and one of the leading Democrats running for the office of Lieutenant Governor is clearly a leader of and major force in the Washington Democratic Party. As such, voters must assume that this action reveals the true intentions of his party – imposing gun bans, seizures and entrapment upon law-abiding Washington gun owners.

If you’re from the 49th Legislative District, there is a rally that was already planned for this Friday. I suggest you arrive and pay your representative a visit. I also suggest strongly you start working on finding a replacement.

Obama has some real balls to speak of the better man Zaevion Dobson to a room of people who have had children die due to gun violence.

He just asked these people to see that our heroes die to protect their feelings. If my child is in high school and needs to confront someone when “gunmen start firing”, endangering people in the street, she will not need to serve as a human shield, but will be able to do so from a covered position with an AR-15 firmly seated in her shoulder by returning well disciplined rifle fire.

Barron Barnett/(The Minuteman Blog) is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.